Sciweavers

DBSEC
2008
152views Database» more  DBSEC 2008»
13 years 8 months ago
An Attack Graph-Based Probabilistic Security Metric
To protect critical resources in today’s networked environments, it is desirable to quantify the likelihood of potential multi-step attacks that combine multiple vulnerabilities....
Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal,...
DBSEC
2008
103views Database» more  DBSEC 2008»
13 years 8 months ago
Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure
Abstract. When generalization algorithms are known to the public, an adversary can obtain a more precise estimation of the secret table than what can be deduced from the disclosed ...
Lei Zhang 0004, Lingyu Wang, Sushil Jajodia, Alexa...
DASFAA
2008
IEEE
149views Database» more  DASFAA 2008»
13 years 8 months ago
A Test Paradigm for Detecting Changes in Transactional Data Streams
A pattern is considered useful if it can be used to help a person to achieve his goal. Mining data streams for useful patterns is important in many applications. However, data stre...
Willie Ng, Manoranjan Dash
DEXAW
2010
IEEE
231views Database» more  DEXAW 2010»
13 years 8 months ago
Extracting User Interests from Search Query Logs: A Clustering Approach
-- This paper proposes to enhance search query log analysis by taking into account the semantic properties of query terms. We first describe a method for extracting a global semant...
Lyes Limam, David Coquil, Harald Kosch, Lionel Bru...
DEXAW
2010
IEEE
202views Database» more  DEXAW 2010»
13 years 8 months ago
Identifying Sentence-Level Semantic Content Units with Topic Models
Abstract--Statistical approaches to document content modeling typically focus either on broad topics or on discourselevel subtopics of a text. We present an analysis of the perform...
Leonhard Hennig, Thomas Strecker, Sascha Narr, Ern...
DEXAW
2010
IEEE
201views Database» more  DEXAW 2010»
13 years 8 months ago
A New Information Filtering Method for WebPages
Internet is a huge source of information. Search engines have indexed much of this information and are able to extract the relevant webpages that are related to a given query. Howe...
Sergio Lopez, Josep Silva
DEXAW
2010
IEEE
179views Database» more  DEXAW 2010»
13 years 8 months ago
Flexible, Robust and Dynamic Dialogue Modeling with a Speech Dialogue Interface for Controlling a Hi-Fi Audio System
This work is focused on the context of speech interfaces for controlling household electronic devices. In particular, we present an example of a spoken dialogue system for controll...
Fernando F. Fernández-Martínez, Javi...
DEXAW
2010
IEEE
166views Database» more  DEXAW 2010»
13 years 8 months ago
Thesaurus Based Term Ranking for Keyword Extraction
In many cases keywords from a restricted set of possible keywords have to be assigned to texts. A common way to find the best keywords is to rank terms occurring in the text accord...
Luit Gazendam, Christian Wartena, Rogier Brussee
DEXAW
2010
IEEE
149views Database» more  DEXAW 2010»
13 years 8 months ago
Using Progressive Filtering to Deal with Information Overload
Abstract-- In the age of Web 2.0 people organize large collections of web pages, articles, or emails in hierarchies of topics, or arrange a large body of knowledge in ontologies. T...
Andrea Addis, Giuliano Armano, Eloisa Vargiu